Howdy, Stranger!

It looks like you're new here. Sign in or register to get started.

Options

Former Tory MPs joining Reform is seen as good thing by Reform voters – politicalbetting.com

SystemSystem Posts: 12,586
edited July 21 in General
Former Tory MPs joining Reform is seen as good thing by Reform voters – politicalbetting.com

Some debate about whether former Tory MPs joining Reform is good for Reform or not. While voters as a whole are slightly more likely to say it’s a bad thing, those planning on voting Reform overwhelmingly think it is a good thing. Lib Dems & Tories most likely to think it’s bad.

Read the full story here

«1345

Comments

  • TazTaz Posts: 19,815
    First
  • TazTaz Posts: 19,815
    If Reform simply becomes a rest home for failed Tories what is the point of it ?

    It needs to build a broad consensus rather than just take a chunk of Tory votes.

    Many people in areas like mine would vote for them but never vote Tory.
  • ydoethurydoethur Posts: 74,345
    Only defectors? Not defecations?
  • ydoethurydoethur Posts: 74,345
    Taz said:

    If Reform simply becomes a rest home for failed Tories what is the point of it ?

    It’s an ego trip for Nigel Farage. Tory defectors stroke his ego. It’s that easy.
  • StuartinromfordStuartinromford Posts: 19,215
    Taz said:

    If Reform simply becomes a rest home for failed Tories what is the point of it ?

    It needs to build a broad consensus rather than just take a chunk of Tory votes.

    Many people in areas like mine would vote for them but never vote Tory.

    Is there that much if about it? For all the excitement about the Red Wall voter, the biggest single slice of the Faragist vote has always been Conservatives who are bored with compromise.
  • DecrepiterJohnLDecrepiterJohnL Posts: 31,871
    edited July 21
    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)
  • MexicanpeteMexicanpete Posts: 33,240
    Wouldn't it be fun if everyone joined Reform from the moribund Tory Party, ousted Farage, and ran on a platform of change, perhaps even with Boris Johnson as Prime Minister in waiting? Farage could be rewarded with a seat in the Lords and maybe a financial incentive or two.

    After the landslide they could even rename the Party to the Conservative Party.
  • DecrepiterJohnLDecrepiterJohnL Posts: 31,871
    Admins: I cannot swear to it but am reasonably sure I could not see the new thread on the vf interface until the first comment had been posted.
  • nunu2nunu2 Posts: 1,505

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    The 5% spending on defence should include cyber threats.
  • Casino_RoyaleCasino_Royale Posts: 63,754

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
  • DopermeanDopermean Posts: 1,309
    Two cheeks of the same arse.
    Just the owners spinning off multiple brands to increase market share, Reform is Daz...
  • EabhalEabhal Posts: 11,287
    edited July 21

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    That's a depressing read. I think we need to criminalise paying the ransom but set up a government insurance scheme that supports small-medium size businesses during and after attacks.
  • TheScreamingEaglesTheScreamingEagles Posts: 122,870

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    At work I have to come up with 156 new passwords a year (13 different systems with a new password required every 30 days and have to be different.)

    A while back I officially ran out of password ideas.
  • eekeek Posts: 30,756

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    If your entire company can be taken down by knowing one employee's password, your biggest problem is not their password.
    You know that and I know that but most people and companies don't understand the true complexity (and cost) of properly securing systems.

  • StuartinromfordStuartinromford Posts: 19,215
    edited July 21

    Wouldn't it be fun if everyone joined Reform from the moribund Tory Party, ousted Farage, and ran on a platform of change, perhaps even with Boris Johnson as Prime Minister in waiting? Farage could be rewarded with a seat in the Lords and maybe a financial incentive or two.

    After the landslide they could even rename the Party to the Conservative Party.

    Could they do that? There was talk of moving from the One Man One Vote (that man being NF) system, but did anything come of it?

    Besides, even a lot of Conservatives like Farage.
  • eekeek Posts: 30,756
    edited July 21

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    That's the old one - it's moved to the 3-4 random words combined approach now and it's HawaiianPizzaExtraPineapple

    (serious comment here, always use a combination of words or a password generator with password management software (Apple's password, bitwarden, lastpass even the one built into chrome or similar).
  • MexicanpeteMexicanpete Posts: 33,240
    Taz said:

    If Reform simply becomes a rest home for failed Tories what is the point of it ?

    It needs to build a broad consensus rather than just take a chunk of Tory votes.

    Many people in areas like mine would vote for them but never vote Tory.

    Which is an excellent ruse for individual Tories dumped at GE 2024 to reboard the gravy train.
  • edmundintokyoedmundintokyo Posts: 17,747
    nunu2 said:

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    The 5% spending on defence should include cyber threats.
    From a national security point of view the ransomware attackers are beneficial. Each of the holes these attackers are finding is something that could have been exploited by a nation state attacker in wartime [*], and companies aren't going to spend money or accept inconvenience to secure their systems unless they're being actively exploited.

    * Admittedly a lot of them are attributable to the North Korean army which thinks it is in a state of war with everybody
  • DopermeanDopermean Posts: 1,309
    Eabhal said:

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    That's a depressing read. I think we need to criminalise paying the ransom but set up a government insurance scheme that supports small-medium size businesses during and after attacks.
    Where then is the incentive for companies to have IT security?
    The competent and the utterly negligent are treated equally.
    The other problem is that this is international crime and state-sponsored.
  • DecrepiterJohnLDecrepiterJohnL Posts: 31,871

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    At work I have to come up with 156 new passwords a year (13 different systems with a new password required every 30 days and have to be different.)

    A while back I officially ran out of password ideas.
    NCSC and its American equivalent are not fans of frequent password changes. Is your IT department still fighting the millennium bug?
  • GallowgateGallowgate Posts: 20,736

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    At work I have to come up with 156 new passwords a year (13 different systems with a new password required every 30 days and have to be different.)

    A while back I officially ran out of password ideas.
    A lot of places seem to have got rid of that requirement now because of how anti human it is. The end result is Password01, Password02, Password03. 2-factor authentication is the king now…
  • TheScreamingEaglesTheScreamingEagles Posts: 122,870
    Huzzah for Apple.

    UK government seeks way out of clash with US over Apple encryption

    Officials fear technology deals with Washington could be impeded after Trump administration weighs in


    Sir Keir Starmer’s government is seeking a way out of a clash with the Trump administration over the UK’s demand that Apple provide it with access to secure customer data, two senior British officials have told the Financial Times.

    The officials both said the Home Office, which ordered the tech giant in January to grant access to its most secure cloud storage system, would probably have to retreat in the face of pressure from senior leaders in Washington, including vice-president JD Vance.

    “This is something that the vice-president is very annoyed about and which needs to be resolved,” said an official in the UK’s technology department. “The Home Office is basically going to have to back down.”

    Both officials said the UK decision to force Apple to break its end-to-end encryption — which has been raised multiple times by top officials in Donald Trump’s administration — could impede technology agreements with the US.

    “One of the challenges for the tech partnerships we’re working on is the encryption issue,” the first official said. “It’s a big red line in the US — they don’t want us messing with their tech companies.”

    Starmer’s government has set out a trade strategy that focuses on digital goals such as AI and data partnerships.

    The other senior government official added that the Home Office had handled the issue of Apple encryption very badly and now had “its back against the wall”, adding: “It’s a problem of the Home Office’s own making, and they’re working on a way around it now”.


    https://www.ft.com/content/3a3e6dbc-591d-4087-9ad3-11af04f0176f
  • EabhalEabhal Posts: 11,287
    Dopermean said:

    Eabhal said:

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    That's a depressing read. I think we need to criminalise paying the ransom but set up a government insurance scheme that supports small-medium size businesses during and after attacks.
    Where then is the incentive for companies to have IT security?
    The competent and the utterly negligent are treated equally.
    The other problem is that this is international crime and state-sponsored.
    In my experience, the risk:reward assessment of small-ish businesses is irrational. Often much more worried about a workplace injury than cyber. They just find it very difficult to justify the expense.

    You'd still apply some sort of excess, which is how you deal with moral hazard in another schemes.
  • TheScreamingEaglesTheScreamingEagles Posts: 122,870

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    At work I have to come up with 156 new passwords a year (13 different systems with a new password required every 30 days and have to be different.)

    A while back I officially ran out of password ideas.
    NCSC and its American equivalent are not fans of frequent password changes. Is your IT department still fighting the millennium bug?
    No, I am one of the few people who has access to every company system (Head of Regulatory Affairs, natch) and previously I could use a single login to access them all.

    About a decade ago it was decided that might be an issue if my account was comprised/hacked that people could see everything with a single login.
  • DecrepiterJohnLDecrepiterJohnL Posts: 31,871
    Rangers legend Paul Gascoigne rushed to intensive care unit
    https://www.thescottishsun.co.uk/sport/15109401/paul-gascoigne-hospital-football/

    England legend Paul Gascoigne rushed to intensive care unit
    https://www.thesun.co.uk/sport/35930377/paul-gascoigne-hospital-football/

    The Sun and Scottish Sun report Gazza was found collapsed at home but is now out of intensive care.
  • DavidLDavidL Posts: 55,946

    Admins: I cannot swear to it but am reasonably sure I could not see the new thread on the vf interface until the first comment had been posted.

    As excuses for missing "first" go that is a good one.
  • DavidLDavidL Posts: 55,946
    edited July 21

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    At work I have to come up with 156 new passwords a year (13 different systems with a new password required every 30 days and have to be different.)

    A while back I officially ran out of password ideas.
    NCSC and its American equivalent are not fans of frequent password changes. Is your IT department still fighting the millennium bug?
    No, I am one of the few people who has access to every company system (Head of Regulatory Affairs, natch) and previously I could use a single login to access them all.

    About a decade ago it was decided that might be an issue if my account was comprised/hacked that people could see everything with a single login.
    Yah think??

    And we think our money is safe in banks.

    I have to change my password every 6 months or so. Like most of the country this involves the increase of a single nominal from the last one. The idea this makes anything more secure is absurd.
  • StillWatersStillWaters Posts: 10,403

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    It was certainly a factor. But basically the company ways going under and needed an emergency fundraising. And the ransomware attack got in the middle of that
  • AnneJGPAnneJGP Posts: 3,758

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    At work I have to come up with 156 new passwords a year (13 different systems with a new password required every 30 days and have to be different.)

    A while back I officially ran out of password ideas.
    Positively invites people to use a self-devised system to generate their passwords.

    Good morning, everybody.
  • TheScreamingEaglesTheScreamingEagles Posts: 122,870
    DavidL said:

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    At work I have to come up with 156 new passwords a year (13 different systems with a new password required every 30 days and have to be different.)

    A while back I officially ran out of password ideas.
    NCSC and its American equivalent are not fans of frequent password changes. Is your IT department still fighting the millennium bug?
    No, I am one of the few people who has access to every company system (Head of Regulatory Affairs, natch) and previously I could use a single login to access them all.

    About a decade ago it was decided that might be an issue if my account was comprised/hacked that people could see everything with a single login.
    Yah think??

    And we think our money is safe in banks.
    This always amused me, there but for the grace of God etc.

    Citigroup credited client’s account with $81tn before error spotted

    US bank meant to send $280 but no funds were transferred despite ‘fat finger’ mistake


    https://www.theguardian.com/business/2025/feb/28/citigroup-credited-client-account-with-81tn-before-error-spotted
  • DavidLDavidL Posts: 55,946

    DavidL said:

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    At work I have to come up with 156 new passwords a year (13 different systems with a new password required every 30 days and have to be different.)

    A while back I officially ran out of password ideas.
    NCSC and its American equivalent are not fans of frequent password changes. Is your IT department still fighting the millennium bug?
    No, I am one of the few people who has access to every company system (Head of Regulatory Affairs, natch) and previously I could use a single login to access them all.

    About a decade ago it was decided that might be an issue if my account was comprised/hacked that people could see everything with a single login.
    Yah think??

    And we think our money is safe in banks.
    This always amused me, there but for the grace of God etc.

    Citigroup credited client’s account with $81tn before error spotted

    US bank meant to send $280 but no funds were transferred despite ‘fat finger’ mistake


    https://www.theguardian.com/business/2025/feb/28/citigroup-credited-client-account-with-81tn-before-error-spotted
    I could do with someone making that error with my bank account. My wife has been playing the lottery for over 20 years now and is yet to get a good win. You'd think you'd get better at it in that time, wouldn't you?
  • AnneJGPAnneJGP Posts: 3,758
    DavidL said:

    DavidL said:

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    At work I have to come up with 156 new passwords a year (13 different systems with a new password required every 30 days and have to be different.)

    A while back I officially ran out of password ideas.
    NCSC and its American equivalent are not fans of frequent password changes. Is your IT department still fighting the millennium bug?
    No, I am one of the few people who has access to every company system (Head of Regulatory Affairs, natch) and previously I could use a single login to access them all.

    About a decade ago it was decided that might be an issue if my account was comprised/hacked that people could see everything with a single login.
    Yah think??

    And we think our money is safe in banks.
    This always amused me, there but for the grace of God etc.

    Citigroup credited client’s account with $81tn before error spotted

    US bank meant to send $280 but no funds were transferred despite ‘fat finger’ mistake


    https://www.theguardian.com/business/2025/feb/28/citigroup-credited-client-account-with-81tn-before-error-spotted
    I could do with someone making that error with my bank account. My wife has been playing the lottery for over 20 years now and is yet to get a good win. You'd think you'd get better at it in that time, wouldn't you?
    I've held premium bonds for over 50 years and never won anything.
  • BartholomewRobertsBartholomewRoberts Posts: 25,423
    eek said:

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    That's the old one - it's moved to the 3-4 random words combined approach now and it's HawaiianPizzaExtraPineapple

    (serious comment here, always use a combination of words or a password generator with password management software (Apple's password, bitwarden, lastpass even the one built into chrome or similar).
    I've always wondered how secure is the latter.

    What prevents Chrome being hacked and all the passwords being taken?

    Especially since the passwords sync across devices, so they must be going online?
  • DavidLDavidL Posts: 55,946
    AnneJGP said:

    DavidL said:

    DavidL said:

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    At work I have to come up with 156 new passwords a year (13 different systems with a new password required every 30 days and have to be different.)

    A while back I officially ran out of password ideas.
    NCSC and its American equivalent are not fans of frequent password changes. Is your IT department still fighting the millennium bug?
    No, I am one of the few people who has access to every company system (Head of Regulatory Affairs, natch) and previously I could use a single login to access them all.

    About a decade ago it was decided that might be an issue if my account was comprised/hacked that people could see everything with a single login.
    Yah think??

    And we think our money is safe in banks.
    This always amused me, there but for the grace of God etc.

    Citigroup credited client’s account with $81tn before error spotted

    US bank meant to send $280 but no funds were transferred despite ‘fat finger’ mistake


    https://www.theguardian.com/business/2025/feb/28/citigroup-credited-client-account-with-81tn-before-error-spotted
    I could do with someone making that error with my bank account. My wife has been playing the lottery for over 20 years now and is yet to get a good win. You'd think you'd get better at it in that time, wouldn't you?
    I've held premium bonds for over 50 years and never won anything.
    I can beat that, I am at 63 years. Its only £2 worth though, given to me as a Christening present. I am not sure if they are even in the draw every week now.
  • wooliedyedwooliedyed Posts: 12,876
    So, conservatives want a Conservative party they can vote for, or an adjacent equivalent.
    Shocking
  • GallowgateGallowgate Posts: 20,736
    DavidL said:

    AnneJGP said:

    DavidL said:

    DavidL said:

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    At work I have to come up with 156 new passwords a year (13 different systems with a new password required every 30 days and have to be different.)

    A while back I officially ran out of password ideas.
    NCSC and its American equivalent are not fans of frequent password changes. Is your IT department still fighting the millennium bug?
    No, I am one of the few people who has access to every company system (Head of Regulatory Affairs, natch) and previously I could use a single login to access them all.

    About a decade ago it was decided that might be an issue if my account was comprised/hacked that people could see everything with a single login.
    Yah think??

    And we think our money is safe in banks.
    This always amused me, there but for the grace of God etc.

    Citigroup credited client’s account with $81tn before error spotted

    US bank meant to send $280 but no funds were transferred despite ‘fat finger’ mistake


    https://www.theguardian.com/business/2025/feb/28/citigroup-credited-client-account-with-81tn-before-error-spotted
    I could do with someone making that error with my bank account. My wife has been playing the lottery for over 20 years now and is yet to get a good win. You'd think you'd get better at it in that time, wouldn't you?
    I've held premium bonds for over 50 years and never won anything.
    I can beat that, I am at 63 years. Its only £2 worth though, given to me as a Christening present. I am not sure if they are even in the draw every week now.
    I thought the consensus was that you need £50k (the max) for probabilities to give a reasonable return.
  • OmniumOmnium Posts: 11,786
    DavidL said:

    AnneJGP said:

    DavidL said:

    DavidL said:

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    At work I have to come up with 156 new passwords a year (13 different systems with a new password required every 30 days and have to be different.)

    A while back I officially ran out of password ideas.
    NCSC and its American equivalent are not fans of frequent password changes. Is your IT department still fighting the millennium bug?
    No, I am one of the few people who has access to every company system (Head of Regulatory Affairs, natch) and previously I could use a single login to access them all.

    About a decade ago it was decided that might be an issue if my account was comprised/hacked that people could see everything with a single login.
    Yah think??

    And we think our money is safe in banks.
    This always amused me, there but for the grace of God etc.

    Citigroup credited client’s account with $81tn before error spotted

    US bank meant to send $280 but no funds were transferred despite ‘fat finger’ mistake


    https://www.theguardian.com/business/2025/feb/28/citigroup-credited-client-account-with-81tn-before-error-spotted
    I could do with someone making that error with my bank account. My wife has been playing the lottery for over 20 years now and is yet to get a good win. You'd think you'd get better at it in that time, wouldn't you?
    I've held premium bonds for over 50 years and never won anything.
    I can beat that, I am at 63 years. Its only £2 worth though, given to me as a Christening present. I am not sure if they are even in the draw every week now.
    NS&I publish a list of the winning bonds for the larger prizes, and I always think it's quite cool when you see a holder with a tiny holding which was bought long ago win.
  • eekeek Posts: 30,756

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    At work I have to come up with 156 new passwords a year (13 different systems with a new password required every 30 days and have to be different.)

    A while back I officially ran out of password ideas.
    NCSC and its American equivalent are not fans of frequent password changes. Is your IT department still fighting the millennium bug?
    No, I am one of the few people who has access to every company system (Head of Regulatory Affairs, natch) and previously I could use a single login to access them all.

    About a decade ago it was decided that might be an issue if my account was comprised/hacked that people could see everything with a single login.
    I can see that - it's why I have multiple accounts at current client - the one that gets me into Azure and whatever Microsoft is calling Active Directory this week is definitely not the account I want to use for day to day emails... You are just the extreme end of that issue...
  • JosiasJessopJosiasJessop Posts: 46,304

    eek said:

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    That's the old one - it's moved to the 3-4 random words combined approach now and it's HawaiianPizzaExtraPineapple

    (serious comment here, always use a combination of words or a password generator with password management software (Apple's password, bitwarden, lastpass even the one built into chrome or similar).
    I've always wondered how secure is the latter.

    What prevents Chrome being hacked and all the passwords being taken?

    Especially since the passwords sync across devices, so they must be going online?
    IM (inexpert) V Google Password Manager is better than nothing, but not the best out there. AIUI it is a bit of a black box: they claim it is secure, but we don't know much about the implementation - but that's the same for many closed-source competitors.

    If someone gains access to your unlocked device, they can access all your passwords - sort of, as there are some extra checks done if you try to access the password management page.

    As ever, it is security versus convenience: where going too inconvenient can actually harm security. I think GPM isn't at the sweetspot in that equation, but it isn't bad. But I don't have things like banking passwords on it (I don't have banking apps on my phone, either....)
  • StillWatersStillWaters Posts: 10,403
    AnneJGP said:

    DavidL said:

    DavidL said:

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    At work I have to come up with 156 new passwords a year (13 different systems with a new password required every 30 days and have to be different.)

    A while back I officially ran out of password ideas.
    NCSC and its American equivalent are not fans of frequent password changes. Is your IT department still fighting the millennium bug?
    No, I am one of the few people who has access to every company system (Head of Regulatory Affairs, natch) and previously I could use a single login to access them all.

    About a decade ago it was decided that might be an issue if my account was comprised/hacked that people could see everything with a single login.
    Yah think??

    And we think our money is safe in banks.
    This always amused me, there but for the grace of God etc.

    Citigroup credited client’s account with $81tn before error spotted

    US bank meant to send $280 but no funds were transferred despite ‘fat finger’ mistake


    https://www.theguardian.com/business/2025/feb/28/citigroup-credited-client-account-with-81tn-before-error-spotted
    I could do with someone making that error with my bank account. My wife has been playing the lottery for over 20 years now and is yet to get a good win. You'd think you'd get better at it in that time, wouldn't you?
    I've held premium bonds for over 50 years and never won anything.
    Seems implausible. I probably win 10-15 times a year. Only small amounts but it’s always nice getting the email
  • StereodogStereodog Posts: 1,106

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    I quite liked seeing the "Knights of Old" lorries when I was driving. They were particularly common along the A14, for other reasons.

    The ones I really like seeing though are "BJ Waters". I went to school with the owner's son, and they were based in a really inconvenient place in the Peak District that I knew quite well.

    Computer hacking should be treated much more seriously by the courts than it is - though like people smuggling, it is an international business and consequently incredibly difficult to tackle.
    Every time we saw one of those lorries my father would repeat a bit of doggerel from his school days. Something like "In days of old when knights were bold and toilets hadn't been invented, they'd drop their load upon the road and go home quite contented"
  • DavidLDavidL Posts: 55,946

    DavidL said:

    AnneJGP said:

    DavidL said:

    DavidL said:

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    At work I have to come up with 156 new passwords a year (13 different systems with a new password required every 30 days and have to be different.)

    A while back I officially ran out of password ideas.
    NCSC and its American equivalent are not fans of frequent password changes. Is your IT department still fighting the millennium bug?
    No, I am one of the few people who has access to every company system (Head of Regulatory Affairs, natch) and previously I could use a single login to access them all.

    About a decade ago it was decided that might be an issue if my account was comprised/hacked that people could see everything with a single login.
    Yah think??

    And we think our money is safe in banks.
    This always amused me, there but for the grace of God etc.

    Citigroup credited client’s account with $81tn before error spotted

    US bank meant to send $280 but no funds were transferred despite ‘fat finger’ mistake


    https://www.theguardian.com/business/2025/feb/28/citigroup-credited-client-account-with-81tn-before-error-spotted
    I could do with someone making that error with my bank account. My wife has been playing the lottery for over 20 years now and is yet to get a good win. You'd think you'd get better at it in that time, wouldn't you?
    I've held premium bonds for over 50 years and never won anything.
    I can beat that, I am at 63 years. Its only £2 worth though, given to me as a Christening present. I am not sure if they are even in the draw every week now.
    I thought the consensus was that you need £50k (the max) for probabilities to give a reasonable return.
    If only I had a spare £49,998.
  • FrancisUrquhartFrancisUrquhart Posts: 85,902
    edited July 21
    Everybody should be using a password manager these days. The are open source free software, which you ensure the master key you never write down and store the db offline on an encrypted drive. My concern with all cloud password managers is you are relying on them to ensure they don't get hacked or do something really dumb.

    You should also turn on 2FA for everything that offers you the opportunity.
  • FrancisUrquhartFrancisUrquhart Posts: 85,902
    Israeli forces launch ground and air assault on Deir al-Balah in central Gaza
  • FrancisUrquhartFrancisUrquhart Posts: 85,902
    It will be interesting how many employees of OFWAT end up working at whatever new regulator is formed.
  • JosiasJessopJosiasJessop Posts: 46,304
    Passwords are evil little things.

    So many are required nowadays, that it is near-impossible to memorise them, especially if they have to change, and so people tend to use the same passwords for many sites, or subtle variations thereon.

    An alternative is writing them down. But that means you can only access them if you are where they are written down, and if someone gains access to the list, you are screwed (unless you somehow encrypt or obfuscate the list).

    And so a compromise is password managers; which means you need to 'trust' the organisation running the manager, and that all your passwords might be exploitable if someone gains access to the manager.
  • Scott_xPScott_xP Posts: 39,330
    Our corporate policy for standard accounts is never change the password, but use 2FA, either authenticator or Yubikey

    For privileged accounts we have a PAM tool that rotates the passwords
  • FrancisUrquhartFrancisUrquhart Posts: 85,902
    Scott_xP said:

    Our corporate policy for standard accounts is never change the password, but use 2FA, either authenticator or Yubikey

    For privileged accounts we have a PAM tool that rotates the passwords

    I hope they don't tie the 2FA to their cellphone though...
  • tlg86tlg86 Posts: 26,965

    It will be interesting how many employees of OFWAT end up working at whatever new regulator is formed.

    Almost all, I would think.
  • GallowgateGallowgate Posts: 20,736
    Scott_xP said:

    Our corporate policy for standard accounts is never change the password, but use 2FA, either authenticator or Yubikey

    For privileged accounts we have a PAM tool that rotates the passwords

    *unless compromised

    I hope!
  • FrancisUrquhartFrancisUrquhart Posts: 85,902
    tlg86 said:

    It will be interesting how many employees of OFWAT end up working at whatever new regulator is formed.

    Almost all, I would think.
    This is a valid criticism Big Dom made of lots of people who failed badly during COVID, bodies that got shut down and reformed, he ran off a big list of people who magically ended up in senior positions in the new body.
  • Scott_xPScott_xP Posts: 39,330
    Omnium said:

    NS&I publish a list of the winning bonds for the larger prizes, and I always think it's quite cool when you see a holder with a tiny holding which was bought long ago win.

    Amidst the ongoing debate about WFA and the plight of pensioners, I know a widow in her eighties, long retired, owns her very nice house outright, in rude health, holidays in places like Egypt or Antarctica.

    She won 100,000 last month

    I don't know how she is going to spend it
  • kjhkjh Posts: 12,914
    DavidL said:

    DavidL said:

    AnneJGP said:

    DavidL said:

    DavidL said:

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    At work I have to come up with 156 new passwords a year (13 different systems with a new password required every 30 days and have to be different.)

    A while back I officially ran out of password ideas.
    NCSC and its American equivalent are not fans of frequent password changes. Is your IT department still fighting the millennium bug?
    No, I am one of the few people who has access to every company system (Head of Regulatory Affairs, natch) and previously I could use a single login to access them all.

    About a decade ago it was decided that might be an issue if my account was comprised/hacked that people could see everything with a single login.
    Yah think??

    And we think our money is safe in banks.
    This always amused me, there but for the grace of God etc.

    Citigroup credited client’s account with $81tn before error spotted

    US bank meant to send $280 but no funds were transferred despite ‘fat finger’ mistake


    https://www.theguardian.com/business/2025/feb/28/citigroup-credited-client-account-with-81tn-before-error-spotted
    I could do with someone making that error with my bank account. My wife has been playing the lottery for over 20 years now and is yet to get a good win. You'd think you'd get better at it in that time, wouldn't you?
    I've held premium bonds for over 50 years and never won anything.
    I can beat that, I am at 63 years. Its only £2 worth though, given to me as a Christening present. I am not sure if they are even in the draw every week now.
    I thought the consensus was that you need £50k (the max) for probabilities to give a reasonable return.
    If only I had a spare £49,998.
    Twice my business was incorrectly paid large sums of money (by my customers not the bank). Once for over £20k and once for over £80k. The latter being on my birthday.
  • DavidLDavidL Posts: 55,946
    Commander of the Ukrainian Unmanned Systems Forces Major Robert Brovdi stated on July 4 that Russia could launch 1,000 drones in a single strike package due to increased production and stockpiles. Ukraine's Main Military Intelligence Directorate (GUR) assessed on June 9 that Russian can produce roughly 170 Shahed-type drones per day and that Russia plans to increase production capacity to 190 drones per day by the end of 2025.

    I just can't conceive of the Ministry of Defence doing anything like this. They are more likely to design 1 hyper expensive and sophisticated drone that is years out of date before it gets deployed. I read recently that the drones on the front line in Ukraine are improving every 2-3 weeks. Its like the development of aircraft in WW1, and whoever has the latest version wins. This is a really serious problem.
  • Scott_xPScott_xP Posts: 39,330

    Scott_xP said:

    Our corporate policy for standard accounts is never change the password, but use 2FA, either authenticator or Yubikey

    For privileged accounts we have a PAM tool that rotates the passwords

    I hope they don't tie the 2FA to their cellphone though...
    SMS is not approved
  • TheuniondivvieTheuniondivvie Posts: 44,390

    Israeli forces launch ground and air assault on Deir al-Balah in central Gaza

    They obviously missed Emily Thornberry on R4 10 minutes ago unequivocally stating that HMG needs to recognise a Palestinian state right now. How foolish are the IDF going to feel!
  • Scott_xPScott_xP Posts: 39,330

    Scott_xP said:

    Our corporate policy for standard accounts is never change the password, but use 2FA, either authenticator or Yubikey

    For privileged accounts we have a PAM tool that rotates the passwords

    *unless compromised

    I hope!
    Indeed.

    With 2FA, knowing the password should not be enough, but yes, if there is a suspicion that the password has been compromised then it is changed
  • FrancisUrquhartFrancisUrquhart Posts: 85,902
    edited July 21
    Scott_xP said:

    Scott_xP said:

    Our corporate policy for standard accounts is never change the password, but use 2FA, either authenticator or Yubikey

    For privileged accounts we have a PAM tool that rotates the passwords

    I hope they don't tie the 2FA to their cellphone though...
    SMS is not approved
    Authenticator apps tied to your cellphone number should also be verboten.
  • TimSTimS Posts: 15,736

    So, conservatives want a Conservative party they can vote for, or an adjacent equivalent.
    Shocking

    I think that’s pretty much it. There’s still a left and a right, and Reform is a party of the right. It’s managed to drag the conservatives in its direction, but its main role is providing voters with a home for swing away from the incumbent, at a time when the Tories aren’t a credible option.

    The Greens are playing a similar role for lefties. The Lib Dems are now driven by somewhat different dynamics.
  • algarkirkalgarkirk Posts: 15,035
    The data about party similarity is not very informative. It would be 1000x more useful if a follow up question asked something like: what are the three most important factors which make Reform most similar to the party X you have identified.
  • TimSTimS Posts: 15,736
    DavidL said:

    Commander of the Ukrainian Unmanned Systems Forces Major Robert Brovdi stated on July 4 that Russia could launch 1,000 drones in a single strike package due to increased production and stockpiles. Ukraine's Main Military Intelligence Directorate (GUR) assessed on June 9 that Russian can produce roughly 170 Shahed-type drones per day and that Russia plans to increase production capacity to 190 drones per day by the end of 2025.

    I just can't conceive of the Ministry of Defence doing anything like this. They are more likely to design 1 hyper expensive and sophisticated drone that is years out of date before it gets deployed. I read recently that the drones on the front line in Ukraine are improving every 2-3 weeks. Its like the development of aircraft in WW1, and whoever has the latest version wins. This is a really serious problem.

    The MoD should just buy them from Ukraine once the war’s over. It’s going to be a defence manufacturing superpower.
  • DecrepiterJohnLDecrepiterJohnL Posts: 31,871
    edited July 21
    Smart51 said:

    ydoethur said:

    Taz said:

    If Reform simply becomes a rest home for failed Tories what is the point of it ?

    It’s an ego trip for Nigel Farage. Tory defectors stroke his ego. It’s that easy.
    Farage is a trouble maker; his whole purpose is to create a stink. He is an attention seeker who doesn't mind people disliking him. This is the reason big personalities don't do well in Reform; they take attention from Farage and he won't have it. It's also the reason why you can't out Farage Reform. How ever far you will go, holding your nose as hard as you can, Farage will happily go two steps further. By competing in a race he will win, you're giving him attention. It's also the reason why Reform won't solve anything in Britain. Keeping a problem going gets attention, solving it makes it all go away.
    This is the same issue that led folk to predict Elon Musk falling out of favour with a president who hates sharing the spotlight.
  • eekeek Posts: 30,756
    edited July 21

    Scott_xP said:

    Scott_xP said:

    Our corporate policy for standard accounts is never change the password, but use 2FA, either authenticator or Yubikey

    For privileged accounts we have a PAM tool that rotates the passwords

    I hope they don't tie the 2FA to their cellphone though...
    SMS is not approved
    Authenticator apps tied to your cellphone number should also be verboten.
    I'm going to pause on that one - while partly correct I don't believe it's possible to move an authenticator app (at least Microsoft's) between devices without secondary checks being done..

    So you would need both the person's phone number / sim card and access to other systems before the authenticator app started working on the new device.

    It's about a year since I switched phones so I can't remember the steps required but it definitely was more than put in sim card, restore phone from backup and it all worked 100%.. It wasn't however that much more
  • SelebianSelebian Posts: 9,555

    AnneJGP said:

    DavidL said:

    DavidL said:

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    At work I have to come up with 156 new passwords a year (13 different systems with a new password required every 30 days and have to be different.)

    A while back I officially ran out of password ideas.
    NCSC and its American equivalent are not fans of frequent password changes. Is your IT department still fighting the millennium bug?
    No, I am one of the few people who has access to every company system (Head of Regulatory Affairs, natch) and previously I could use a single login to access them all.

    About a decade ago it was decided that might be an issue if my account was comprised/hacked that people could see everything with a single login.
    Yah think??

    And we think our money is safe in banks.
    This always amused me, there but for the grace of God etc.

    Citigroup credited client’s account with $81tn before error spotted

    US bank meant to send $280 but no funds were transferred despite ‘fat finger’ mistake


    https://www.theguardian.com/business/2025/feb/28/citigroup-credited-client-account-with-81tn-before-error-spotted
    I could do with someone making that error with my bank account. My wife has been playing the lottery for over 20 years now and is yet to get a good win. You'd think you'd get better at it in that time, wouldn't you?
    I've held premium bonds for over 50 years and never won anything.
    Seems implausible. I probably win 10-15 times a year. Only small amounts but it’s always nice getting the email
    Depends how much you hold - we have some savings for the kids in premium bonds and they win several times per year - works out to a fairly competitive interest rate. But my £10 that was bought for me as a christening present? That's never won anything in over 40 years.
  • FrancisUrquhartFrancisUrquhart Posts: 85,902
    edited July 21
    eek said:

    Scott_xP said:

    Scott_xP said:

    Our corporate policy for standard accounts is never change the password, but use 2FA, either authenticator or Yubikey

    For privileged accounts we have a PAM tool that rotates the passwords

    I hope they don't tie the 2FA to their cellphone though...
    SMS is not approved
    Authenticator apps tied to your cellphone number should also be verboten.
    I'm going to pause on that one - while partly correct I don't believe it's possible to move an authenticator app (at least Microsoft's) between devices without secondary checks being done..
    From my days in high stakes gambling, I know a number of top poker players who got hacked in the following way. They tied their authenticator app to their phone number. Somebody then phoned up the cellphone company or had a corrupt individual inside and said they had lost their cellphone / SIM, and had new ones sent out and intercepted the mail / convinced them to send it to another address.
  • Casino_RoyaleCasino_Royale Posts: 63,754
    I suspect most people have one password for all their accounts they never change.

    Otherwise they can't remember it and get locked out after three attempts, necessitating long calls to customer services with lots more security questions- which they also can't always remember.
  • eekeek Posts: 30,756

    eek said:

    Scott_xP said:

    Scott_xP said:

    Our corporate policy for standard accounts is never change the password, but use 2FA, either authenticator or Yubikey

    For privileged accounts we have a PAM tool that rotates the passwords

    I hope they don't tie the 2FA to their cellphone though...
    SMS is not approved
    Authenticator apps tied to your cellphone number should also be verboten.
    I'm going to pause on that one - while partly correct I don't believe it's possible to move an authenticator app (at least Microsoft's) between devices without secondary checks being done..
    From my days in high stakes gambling, I know a number of top poker players who got hacked in the following way. They tied their authenticator app to their phone number. Somebody then phoned up the cellphone company or had a corrupt individual inside and said they had lost their cellphone / SIM, and had new ones sent out and intercepted the mail / convinced them to send it to another address.
    Security is constantly changing - what may have been true x years ago isn't the case now. As I said in my edited reply I swapped phone last year and for the authenticator app to work I had to do some things - it wasn't much but it did require you having access to more than just my phone..
  • StillWatersStillWaters Posts: 10,403

    Passwords are evil little things.

    So many are required nowadays, that it is near-impossible to memorise them, especially if they have to change, and so people tend to use the same passwords for many sites, or subtle variations thereon.

    An alternative is writing them down. But that means you can only access them if you are where they are written down, and if someone gains access to the list, you are screwed (unless you somehow encrypt or obfuscate the list).

    And so a compromise is password managers; which means you need to 'trust' the organisation running the manager, and that all your passwords might be exploitable if someone gains access to the manager.

    Create your own system.

    For example (and this is not mine) take a long poem like Tennyson’s Revenge, rank your systems alphabetically and use the first letter of each word in the corresponding line.

    It means you just need to remember the poem…
  • Scott_xPScott_xP Posts: 39,330
    Using your phone number as 2FA is bad

    Using a 2FA authenticator app running on your phone is not the same
  • Sean_FSean_F Posts: 39,175
    TimS said:

    DavidL said:

    Commander of the Ukrainian Unmanned Systems Forces Major Robert Brovdi stated on July 4 that Russia could launch 1,000 drones in a single strike package due to increased production and stockpiles. Ukraine's Main Military Intelligence Directorate (GUR) assessed on June 9 that Russian can produce roughly 170 Shahed-type drones per day and that Russia plans to increase production capacity to 190 drones per day by the end of 2025.

    I just can't conceive of the Ministry of Defence doing anything like this. They are more likely to design 1 hyper expensive and sophisticated drone that is years out of date before it gets deployed. I read recently that the drones on the front line in Ukraine are improving every 2-3 weeks. Its like the development of aircraft in WW1, and whoever has the latest version wins. This is a really serious problem.

    The MoD should just buy them from Ukraine once the war’s over. It’s going to be a defence manufacturing superpower.
    I expect that the Ukrainians will be training our army (and other Western armies), once the war ends.
  • Sean_FSean_F Posts: 39,175

    Passwords are evil little things.

    So many are required nowadays, that it is near-impossible to memorise them, especially if they have to change, and so people tend to use the same passwords for many sites, or subtle variations thereon.

    An alternative is writing them down. But that means you can only access them if you are where they are written down, and if someone gains access to the list, you are screwed (unless you somehow encrypt or obfuscate the list).

    And so a compromise is password managers; which means you need to 'trust' the organisation running the manager, and that all your passwords might be exploitable if someone gains access to the manager.

    Create your own system.

    For example (and this is not mine) take a long poem like Tennyson’s Revenge, rank your systems alphabetically and use the first letter of each word in the corresponding line.

    It means you just need to remember the poem…
    What drives me mad is "Prove you are not a robot", followed by endless photos of fire hydrants, bicycles, and traffic lights.
  • FrancisUrquhartFrancisUrquhart Posts: 85,902
    edited July 21
    eek said:

    eek said:

    Scott_xP said:

    Scott_xP said:

    Our corporate policy for standard accounts is never change the password, but use 2FA, either authenticator or Yubikey

    For privileged accounts we have a PAM tool that rotates the passwords

    I hope they don't tie the 2FA to their cellphone though...
    SMS is not approved
    Authenticator apps tied to your cellphone number should also be verboten.
    I'm going to pause on that one - while partly correct I don't believe it's possible to move an authenticator app (at least Microsoft's) between devices without secondary checks being done..
    From my days in high stakes gambling, I know a number of top poker players who got hacked in the following way. They tied their authenticator app to their phone number. Somebody then phoned up the cellphone company or had a corrupt individual inside and said they had lost their cellphone / SIM, and had new ones sent out and intercepted the mail / convinced them to send it to another address.
    Security is constantly changing - what may have been true x years ago isn't the case now. As I said in my edited reply I swapped phone last year and for the authenticator app to work I had to do some things - it wasn't much but it did require you having access to more than just my phone..
    You are probably correct. However, I switched mine recently and I had some less important ones tied to an authenciator app (I can't remember why I did), not microsoft or google, which offered cloud backed ups tied to your phone number (which I didn't do). From what I could tell all you needed is phone number and a pin if you did the cloud backup. I bet a lot of people put in the same pin as their log in for the phone, which is also how a lot of people have got "hacked" for banking apps.....they observe you log into your phone, steal phone, and then got with the high chance your banking app pin is the same as the one for the lockscreen.
  • Casino_RoyaleCasino_Royale Posts: 63,754
    Sean_F said:

    Passwords are evil little things.

    So many are required nowadays, that it is near-impossible to memorise them, especially if they have to change, and so people tend to use the same passwords for many sites, or subtle variations thereon.

    An alternative is writing them down. But that means you can only access them if you are where they are written down, and if someone gains access to the list, you are screwed (unless you somehow encrypt or obfuscate the list).

    And so a compromise is password managers; which means you need to 'trust' the organisation running the manager, and that all your passwords might be exploitable if someone gains access to the manager.

    Create your own system.

    For example (and this is not mine) take a long poem like Tennyson’s Revenge, rank your systems alphabetically and use the first letter of each word in the corresponding line.

    It means you just need to remember the poem…
    What drives me mad is "Prove you are not a robot", followed by endless photos of fire hydrants, bicycles, and traffic lights.
    I'm pretty sure AI could easily fathom that now as well.
  • Casino_RoyaleCasino_Royale Posts: 63,754

    Passwords are evil little things.

    So many are required nowadays, that it is near-impossible to memorise them, especially if they have to change, and so people tend to use the same passwords for many sites, or subtle variations thereon.

    An alternative is writing them down. But that means you can only access them if you are where they are written down, and if someone gains access to the list, you are screwed (unless you somehow encrypt or obfuscate the list).

    And so a compromise is password managers; which means you need to 'trust' the organisation running the manager, and that all your passwords might be exploitable if someone gains access to the manager.

    Create your own system.

    For example (and this is not mine) take a long poem like Tennyson’s Revenge, rank your systems alphabetically and use the first letter of each word in the corresponding line.

    It means you just need to remember the poem…
    This is peak pb
  • OnlyLivingBoyOnlyLivingBoy Posts: 16,675
    Stereodog said:

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    I quite liked seeing the "Knights of Old" lorries when I was driving. They were particularly common along the A14, for other reasons.

    The ones I really like seeing though are "BJ Waters". I went to school with the owner's son, and they were based in a really inconvenient place in the Peak District that I knew quite well.

    Computer hacking should be treated much more seriously by the courts than it is - though like people smuggling, it is an international business and consequently incredibly difficult to tackle.
    Every time we saw one of those lorries my father would repeat a bit of doggerel from his school days. Something like "In days of old when knights were bold and toilets hadn't been invented, they'd drop their load upon the road and go home quite contented"
    "Blades of grass to wipe their arse" is the version I remember.
  • algarkirkalgarkirk Posts: 15,035
    TimS said:

    So, conservatives want a Conservative party they can vote for, or an adjacent equivalent.
    Shocking

    I think that’s pretty much it. There’s still a left and a right, and Reform is a party of the right. It’s managed to drag the conservatives in its direction, but its main role is providing voters with a home for swing away from the incumbent, at a time when the Tories aren’t a credible option.

    The Greens are playing a similar role for lefties. The Lib Dems are now driven by somewhat different dynamics.
    Outside the extremes 'left' and 'right' are almost useless terms. They are all social democrats with different decorations, including Reform. Big spending, welfare state, NHS, regulated capitalism, NATO. All want (though fail to achieve) lower migration, an issue which in neither right nor left. All want less CO2 in the atmosphere, while Reform think the UK should not try to lead the world in this to the UK's economic detriment. This is wrong headed, but again neither right nor left.

    The common struggle for all of them, including Reform as they shall find out, and are even now finding out in local authorities is whether social democracy, the only show in town since 1945, is sustainable, and if not what rough beast would replace it.

  • Casino_RoyaleCasino_Royale Posts: 63,754
    algarkirk said:

    TimS said:

    So, conservatives want a Conservative party they can vote for, or an adjacent equivalent.
    Shocking

    I think that’s pretty much it. There’s still a left and a right, and Reform is a party of the right. It’s managed to drag the conservatives in its direction, but its main role is providing voters with a home for swing away from the incumbent, at a time when the Tories aren’t a credible option.

    The Greens are playing a similar role for lefties. The Lib Dems are now driven by somewhat different dynamics.
    Outside the extremes 'left' and 'right' are almost useless terms. They are all social democrats with different decorations, including Reform. Big spending, welfare state, NHS, regulated capitalism, NATO. All want (though fail to achieve) lower migration, an issue which in neither right nor left. All want less CO2 in the atmosphere, while Reform think the UK should not try to lead the world in this to the UK's economic detriment. This is wrong headed, but again neither right nor left.

    The common struggle for all of them, including Reform as they shall find out, and are even now finding out in local authorities is whether social democracy, the only show in town since 1945, is sustainable, and if not what rough beast would replace it.

    The fundamental issue is we are no longer growing at 3%+ GDP per year long-term, pretty much guaranteed, and the West is no longer absolute top dog.

    From this, everything else follows.
  • JosiasJessopJosiasJessop Posts: 46,304
    There's another side to all of this: resilience.

    One company I know of apparently has an IT head who *assumes* that passwords will sometime be hacked or stolen. Therefore the company's policy is to tie down the database and systems. If you don't need access to a system, you don't get it. Even then, you can only access certain parts of it. And you should not be able to do large data dumps without extra permissions on a case-by-case basis. It is apparently a PITA for the staff, but often that is because they are trying do things they shouldn't be.

    And yes, he is well aware that he, and the couple of deputies, are holes in this because someone needs God rights.

    But they also spend a lot of effort and money on resilience / disaster recovery. *If* something happens; like a ransomware attack, how can they preserve their data and get back up and running as quickly as possible, with as little disruption? This also covers things like fires.

    However, all of this costs money, and requires a highly-skilled IT department that is willing to push back when a senior manager asks: "Of course I need to access this data I have no business seeing. Don't you know who I am ..."
  • RochdalePioneersRochdalePioneers Posts: 30,646
    Talking about Reform, I was chatting with the local Reform people at the New Deer Agricultural Show yesterday. Whilst they have been welcoming of local Tories throwing a strop and defecting, they also think there are a significant pool of SNP voters they can bring across.

    With Independence dead in the water (drowned by the SNP itself) and deep upset about the state of the country, Reform think they have a great opportunity to steal from the nats as much as the Tories.
  • DecrepiterJohnLDecrepiterJohnL Posts: 31,871

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    At work I have to come up with 156 new passwords a year (13 different systems with a new password required every 30 days and have to be different.)

    A while back I officially ran out of password ideas.
    NCSC and its American equivalent are not fans of frequent password changes. Is your IT department still fighting the millennium bug?
    No, I am one of the few people who has access to every company system (Head of Regulatory Affairs, natch) and previously I could use a single login to access them all.

    About a decade ago it was decided that might be an issue if my account was comprised/hacked that people could see everything with a single login.
    Your IT department was still fighting the millennium bug until 10 years ago, and only afterwards pondered the question of access controls? Except that can't be right because my non-banking company gave us hardware devices, and kerberos (software) when I joined 25 years ago. I would offer my services on a contract basis but as a bank you will need MBB-trained Oxbridge graduates to print out NCSC and CISA guidance in leather-bound folders.

    In the mean time, post-it notes under your mouse mat are best.
  • CookieCookie Posts: 15,727
    Don't know if we've done this, but you know the old chestnut about independent schools being far better at gaming the system to get their pupils additional time and other allowances in exams? It turns out that Ofqual just miscounted. For the past ten years. And that adjuatmenta made for independent school pupils are no different to what you'd expect.
    Not a political point, just a bit of amusing incompetence.
    https://www.theguardian.com/education/2025/jul/17/ofqual-admits-massively-exaggerating-number-of-students-getting-exam-assistance?CMP=fb_gu&utm_medium=Social_img&utm_source=Facebook&fbclid=IwZXh0bgNhZW0CMTEAAR4vdATeXzaGF8u9MmfZuTZyuhrX2R4SBA5NESDYbWzyD563uyhTQ3uAAfSXuQ_aem_vmJwY4UMOIiQeQIwmkjArQ#Echobox=1752760244
  • RochdalePioneersRochdalePioneers Posts: 30,646

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    At work I have to come up with 156 new passwords a year (13 different systems with a new password required every 30 days and have to be different.)

    A while back I officially ran out of password ideas.
    As you are Secure by creating passwords from the name / description of your shoes, surely there is only one possible way to be More Secure.

    Buy more shoes.
  • DecrepiterJohnLDecrepiterJohnL Posts: 31,871

    Talking about Reform, I was chatting with the local Reform people at the New Deer Agricultural Show yesterday. Whilst they have been welcoming of local Tories throwing a strop and defecting, they also think there are a significant pool of SNP voters they can bring across.

    With Independence dead in the water (drowned by the SNP itself) and deep upset about the state of the country, Reform think they have a great opportunity to steal from the nats as much as the Tories.

    Reform can take NOTA voters from the SNP, if not the true believers.
  • isamisam Posts: 42,234
    Zarah Sultana says the cartoonist has brown faced the packaging, but surely it’s just a cartoon of her? I realise I don’t take this stuff as seriously as some, but this seems ridiculous.

    Brownfacing a box of raisins and mocking my surname.

    what you’d expect from a right-wing hack who is the daughter of an aristocrat and ex-Tory MP.

    https://x.com/zarahsultana/status/1947066599
    653232974?s=46&t=CW4pL-mMpTqsJXCdjW0Z6Q
  • DecrepiterJohnLDecrepiterJohnL Posts: 31,871

    There's another side to all of this: resilience.

    One company I know of apparently has an IT head who *assumes* that passwords will sometime be hacked or stolen. Therefore the company's policy is to tie down the database and systems. If you don't need access to a system, you don't get it. Even then, you can only access certain parts of it. And you should not be able to do large data dumps without extra permissions on a case-by-case basis. It is apparently a PITA for the staff, but often that is because they are trying do things they shouldn't be.

    And yes, he is well aware that he, and the couple of deputies, are holes in this because someone needs God rights.

    But they also spend a lot of effort and money on resilience / disaster recovery. *If* something happens; like a ransomware attack, how can they preserve their data and get back up and running as quickly as possible, with as little disruption? This also covers things like fires.

    However, all of this costs money, and requires a highly-skilled IT department that is willing to push back when a senior manager asks: "Of course I need to access this data I have no business seeing. Don't you know who I am ..."

    One subtle problem is that IT can lose sight of business requirements. Sure, we can recover from a ransomware attack by rebuilding servers and restoring these guaranteed-safe backup images. Oh, what do you mean you needed current sales, logistics and payroll data, not last month's when the backups were taken? One problem the Co-op and M&S faced was not knowing what was on the shelves, for instance.

    Pointless anecdote: while troubleshooting a performance issue, I once had to alert a Whitehall department they were backing up information that could easily be re-uploaded from source, but not backing up live data.
  • FrancisUrquhartFrancisUrquhart Posts: 85,902
    isam said:

    Zarah Sultana says the cartoonist has brown faced the packaging, but surely it’s just a cartoon of her? I realise I don’t take this stuff as seriously as some, but this seems ridiculous.

    Brownfacing a box of raisins and mocking my surname.

    what you’d expect from a right-wing hack who is the daughter of an aristocrat and ex-Tory MP.

    https://x.com/zarahsultana/status/1947066599
    653232974?s=46&t=CW4pL-mMpTqsJXCdjW0Z6Q

    She is permanently on outrage mode, despite her own very dodgy past when it comes to social media posting.
  • ydoethurydoethur Posts: 74,345
    edited July 21

    tlg86 said:

    It will be interesting how many employees of OFWAT end up working at whatever new regulator is formed.

    Almost all, I would think.
    This is a valid criticism Big Dom made of lots of people who failed badly during COVID, bodies that got shut down and reformed, he ran off a big list of people who magically ended up in senior positions in the new body.
    Indeed.

    Not just Covid either. I can think of several people who failed catastrophically at the DfE under Gove. They went on to other things - one became Chief of Ofsted and another became Chief of Staff to the PM (and a phone thief, and an amateur optician…)
  • BattlebusBattlebus Posts: 1,189
    Omnium said:

    DavidL said:

    AnneJGP said:

    DavidL said:

    DavidL said:

    Weak password allowed hackers to sink a 158-year-old company
    https://www.bbc.co.uk/news/articles/cx2gx28815wo

    Panorama tonight. A ransomware attack destroyed KNP (Knights of Old lorries) and 700 jobs were lost.

    Stay safe, everyone, appears to be the advice of the NCSC.

    (This is not a parable for dicking around with the layout of PB.)

    Everyone knows the site editor's password is a very secure Zama202Scipio
    At work I have to come up with 156 new passwords a year (13 different systems with a new password required every 30 days and have to be different.)

    A while back I officially ran out of password ideas.
    NCSC and its American equivalent are not fans of frequent password changes. Is your IT department still fighting the millennium bug?
    No, I am one of the few people who has access to every company system (Head of Regulatory Affairs, natch) and previously I could use a single login to access them all.

    About a decade ago it was decided that might be an issue if my account was comprised/hacked that people could see everything with a single login.
    Yah think??

    And we think our money is safe in banks.
    This always amused me, there but for the grace of God etc.

    Citigroup credited client’s account with $81tn before error spotted

    US bank meant to send $280 but no funds were transferred despite ‘fat finger’ mistake


    https://www.theguardian.com/business/2025/feb/28/citigroup-credited-client-account-with-81tn-before-error-spotted
    I could do with someone making that error with my bank account. My wife has been playing the lottery for over 20 years now and is yet to get a good win. You'd think you'd get better at it in that time, wouldn't you?
    I've held premium bonds for over 50 years and never won anything.
    I can beat that, I am at 63 years. Its only £2 worth though, given to me as a Christening present. I am not sure if they are even in the draw every week now.
    NS&I publish a list of the winning bonds for the larger prizes, and I always think it's quite cool when you see a holder with a tiny holding which was bought long ago win.
    From the latest list, a £5 purchased in March 1962 won £1000. But it may have won before as well. Seems still to yield 3%-4% (after tax. Thanks Gordon)
  • JosiasJessopJosiasJessop Posts: 46,304

    There's another side to all of this: resilience.

    One company I know of apparently has an IT head who *assumes* that passwords will sometime be hacked or stolen. Therefore the company's policy is to tie down the database and systems. If you don't need access to a system, you don't get it. Even then, you can only access certain parts of it. And you should not be able to do large data dumps without extra permissions on a case-by-case basis. It is apparently a PITA for the staff, but often that is because they are trying do things they shouldn't be.

    And yes, he is well aware that he, and the couple of deputies, are holes in this because someone needs God rights.

    But they also spend a lot of effort and money on resilience / disaster recovery. *If* something happens; like a ransomware attack, how can they preserve their data and get back up and running as quickly as possible, with as little disruption? This also covers things like fires.

    However, all of this costs money, and requires a highly-skilled IT department that is willing to push back when a senior manager asks: "Of course I need to access this data I have no business seeing. Don't you know who I am ..."

    One subtle problem is that IT can lose sight of business requirements. Sure, we can recover from a ransomware attack by rebuilding servers and restoring these guaranteed-safe backup images. Oh, what do you mean you needed current sales, logistics and payroll data, not last month's when the backups were taken? One problem the Co-op and M&S faced was not knowing what was on the shelves, for instance.

    Pointless anecdote: while troubleshooting a performance issue, I once had to alert a Whitehall department they were backing up information that could easily be re-uploaded from source, but not backing up live data.
    Indeed - and the correct approach will depend on the type of business. But allegedly, all too often companies give God or near-God rights to far too many people, meaning if their accounts are compromised, entire systems are.
  • Scott_xPScott_xP Posts: 39,330

    There's another side to all of this: resilience.

    One company I know of apparently has an IT head who *assumes* that passwords will sometime be hacked or stolen. Therefore the company's policy is to tie down the database and systems. If you don't need access to a system, you don't get it. Even then, you can only access certain parts of it. And you should not be able to do large data dumps without extra permissions on a case-by-case basis. It is apparently a PITA for the staff, but often that is because they are trying do things they shouldn't be.

    And yes, he is well aware that he, and the couple of deputies, are holes in this because someone needs God rights.

    But they also spend a lot of effort and money on resilience / disaster recovery. *If* something happens; like a ransomware attack, how can they preserve their data and get back up and running as quickly as possible, with as little disruption? This also covers things like fires.

    However, all of this costs money, and requires a highly-skilled IT department that is willing to push back when a senior manager asks: "Of course I need to access this data I have no business seeing. Don't you know who I am ..."

    :)

    This is a live discussion in our organisation

    We spend a lot of money on backups and if you do it right that is one way to recover from ransomware attacks

    And least privileged access is a regular topic, as is 'network segmentation'

    I am chuckling ironically at the "highly-skilled IT department" as someone at corporate just decided the best way to keep the enterprise secure was to lay off a bunch of IT staff...
  • DecrepiterJohnLDecrepiterJohnL Posts: 31,871
    isam said:

    Zarah Sultana says the cartoonist has brown faced the packaging, but surely it’s just a cartoon of her? I realise I don’t take this stuff as seriously as some, but this seems ridiculous.

    Brownfacing a box of raisins and mocking my surname.

    what you’d expect from a right-wing hack who is the daughter of an aristocrat and ex-Tory MP.

    https://x.com/zarahsultana/status/1947066599
    653232974?s=46&t=CW4pL-mMpTqsJXCdjW0Z6Q

    I think you meant https://x.com/zarahsultana/status/1947066599653232974

    Humourless MP meets nepo-baby cartoonist.
  • FrancisUrquhartFrancisUrquhart Posts: 85,902
    edited July 21
    ydoethur said:

    tlg86 said:

    It will be interesting how many employees of OFWAT end up working at whatever new regulator is formed.

    Almost all, I would think.
    This is a valid criticism Big Dom made of lots of people who failed badly during COVID, bodies that got shut down and reformed, he ran off a big list of people who magically ended up in senior positions in the new body.
    Indeed.

    Not just Covid either. I can think of several people who failed catastrophically at the DfE under Gove. They went on to other things - one became Chief of Ofsted and another became Chief of Staff to the PM (and a phone thief, and an amateur optician…)
    Its not just a government problem. This is also private sector, good companies keep their top management, the f##ks up lose their jobs and then seem to get hired by other companies who are can't get the good people. See the Farage debanking scandal, Howard Davies serial f##k up but was still in a top role and Alison Rose quickly got two big jobs since been dismissed.
  • RochdalePioneersRochdalePioneers Posts: 30,646

    There's another side to all of this: resilience.

    One company I know of apparently has an IT head who *assumes* that passwords will sometime be hacked or stolen. Therefore the company's policy is to tie down the database and systems. If you don't need access to a system, you don't get it. Even then, you can only access certain parts of it. And you should not be able to do large data dumps without extra permissions on a case-by-case basis. It is apparently a PITA for the staff, but often that is because they are trying do things they shouldn't be.

    And yes, he is well aware that he, and the couple of deputies, are holes in this because someone needs God rights.

    But they also spend a lot of effort and money on resilience / disaster recovery. *If* something happens; like a ransomware attack, how can they preserve their data and get back up and running as quickly as possible, with as little disruption? This also covers things like fires.

    However, all of this costs money, and requires a highly-skilled IT department that is willing to push back when a senior manager asks: "Of course I need to access this data I have no business seeing. Don't you know who I am ..."

    One subtle problem is that IT can lose sight of business requirements. Sure, we can recover from a ransomware attack by rebuilding servers and restoring these guaranteed-safe backup images. Oh, what do you mean you needed current sales, logistics and payroll data, not last month's when the backups were taken? One problem the Co-op and M&S faced was not knowing what was on the shelves, for instance.

    Pointless anecdote: while troubleshooting a performance issue, I once had to alert a Whitehall department they were backing up information that could easily be re-uploaded from source, but not backing up live data.
    They had a simple solution to that - audit their stock. In a previous business the logistics firm got cyberattacked. Whole system went down. They were back up and running in a day by sending every member of the team out into their various warehouses to manually count every item, and then build a spreadsheet of what they had.

    Supermarket systems can be notoriously crappy anyway, with manual stock counts required to validate the crap being shown on the computer. So the staff at Co-op and M&S must have already had to stock check, so just do the same for the whole store.

    Audit every store. Input into a big database. Audit each warehouse. Same. Get back up and running. Manual is slow, so it won't be slick. But you can operate like that - I worked for a company selling £150m of production to supermarkets and bizarrely they were still wholly operating on very large spreadsheets.
Sign In or Register to comment.